Information operations have been conducted by militaries since the earliest days of warfare. Sun Tzu wrote of the importance of information supremacy to the military commander and of the importance of controlling information within the battle space.
Military cyber operations take many guises and in the operational domain remain shrouded in extreme secrecy. As defined by the United States Department of Defense (DoD) Law of War Manual (2015) cyber operations employ “cyberspace capabilities where the primary purpose is to achieve objectives in or through cyberspace.
Cyberspace is a component of the global information domain consisting of the interdependent network of information technology infrastructures, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers, and their resident data (ADF, 2010).
Maritime security incidents in 2019 saw coordinated attacks against commercial shipping near the Strait of Hormuz, off the Port of Fujairah, and in the Sea of Oman.
A Critical Vulnerability: The Impact of the Submarine Threat on Australia’s Maritime Defence 1915-54
This volume examines the impact of the submarine threat on Australia’s maritime defence from 1915 to 1954 and assesses the effectiveness of the RAN in dealing with the trade defence problem over this period.
The security of submarine communications cables (SCCs) is vital to Australia’s strategic and economic interests. Transoceanic information flows for military, government, corporate and private communications rely almost entirely on SCCs.